Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks 2004
DOI: 10.1145/1029102.1029119
|View full text |Cite
|
Sign up to set email alerts
|

Towards provable security for ad hoc routing protocols

Abstract: We propose a formal framework for the security analysis of on-demand source routing protocols for wireless ad hoc networks. Our approach is based on the well-known simulation paradigm that has been proposed to prove the security of cryptographic protocols. Our main contribution is the application of the simulation approach in the context of ad hoc routing. This involves a precise definition of a real-world model, which describes the real operation of the protocol, and an ideal-world model, which captures what … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0
1

Year Published

2005
2005
2016
2016

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(53 citation statements)
references
References 28 publications
0
52
0
1
Order By: Relevance
“…This test and many others (e.g. [21,15]) can be easily modelled using functions over terms. Clearly, not all functions over terms are meaningful to model protocols.…”
Section: Functions Over Termsmentioning
confidence: 99%
See 2 more Smart Citations
“…This test and many others (e.g. [21,15]) can be easily modelled using functions over terms. Clearly, not all functions over terms are meaningful to model protocols.…”
Section: Functions Over Termsmentioning
confidence: 99%
“…For the SRP protocol, we recover the attack mentioned in [15] with the topology given in Example 5, and from the initial configuration:…”
Section: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…This approach is based on endairA [6] and [3]. In endairA, the initiator of the route discovery process generates a route request, which contains the identifiers of the initiator and the target, and a randomly generated query identifier.…”
Section: Our Workmentioning
confidence: 99%
“…Routing standards for MANETS have been initiated and also various methods have been suggested to safeguard the different ad hoc routing standards like SRP, SAODV, Ariadne, ARAN, SADSR, SEAD and SLSP. Futile attempts have been made to safeguard these standards which are heavily susceptible due to erratic nature of the reserved hosts and deficiency in securing hardware, for which Buttya"n and Vajda [4] and Acs et al [5,6,7]proposed methods to secure them.…”
Section: Introductionmentioning
confidence: 99%